Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: Sync the OneDrive Files You Need with Windows 10

Tip of the Week: Sync the OneDrive Files You Need with Windows 10

Microsoft OneDrive is a cloud file hosting service that uses synchronization to allow users real-time access to saved information. OneDrive, is most associated with Office 365, to which it offers one terabyte of cloud storage (there is a free tier for consumers as well). Since OneDrive is often used to save Word, Excel, Powerpoint, and OneNote documents, having access to this information from your navigation pane inside of Windows 10 makes it simpler for users to get to files inside of OneDrive. Today, we’ll take a look at how to set the feature up to sync with OneDrive.

OneDrive comes preinstalled on Windows 10 and is integrated into the file explorer. This means file security and syncing is easy. All a user needs to do drag-and-drop the file into a file folder as you typically would inside of Windows Explorer. But what happens if you don’t want to sync your entire OneDrive with your Windows PC? Some people tend to use the cloud for specific purposes and don’t want their whole OneDrive folder available on the computer they are working on. Fortunately, Microsoft has developed OneDrive with the availability to assign what files users want to sync with Windows 10.

Here’s how:

  1. Select the white (or blue) OneDrive cloud icon in the Windows taskbar notification area:
  3. It will open a pop-up screen. In this screen select More > Settings.
  5. Select the Account tab, and select Choose folders
  7. You have to make sure the “Make all files available” box is toggled off:

At this juncture you can select all files you want to see. Press OK and all the files you want synced with Windows 10 will be available in Explorer.

For more great tips and tricks that can help you be more productive, efficient, and effective, call the IT experts at 415 IT today at (415) 295-4898

Taking a Look at a Manufacturer’s IT
Professional Services Depends on This Technology


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 31 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Privacy Network Security Hosted Solutions Cloud IT Services Data Recovery Software Efficiency Managed IT Services Internet Email Malware Outsourced IT Business Innovation Tech Term Small Business Cloud Computing Upgrade Hackers Cybersecurity Business Management Windows 10 User Tips Computer Microsoft Collaboration Business Continuity Google Mobile Devices Hardware Phishing Communication Workplace Tips Ransomware VoIp Managed Service Smartphones Managed Service Provider Backup Android Paperless Office Server Encryption Communications Quick Tips Office 365 Data Management Disaster Recovery Managed IT Mobile Device Remote Monitoring Vulnerability Business Technology Holiday Windows 7 BDR Wi-Fi Saving Money Browser Network Internet of Things Healthcare Artificial Intelligence Passwords Compliance Help Desk Document Management Government Social Media Facebook Remote Work Save Money Applications Miscellaneous Laptops Smartphone Managed IT services Vendor Management Two-factor Authentication Redundancy Scam Avoiding Downtime Health Users Antivirus Virtualization Bandwidth Processor Microsoft Office Automation Data Security Blockchain Information Project Management Tip of the week Employer-Employee Relationship Company Culture Data Loss Meetings Maintenance Chrome IT Management OneDrive VPN IoT Customer Relationship Management Analytics Router Access Control Storage Virtual Private Network BYOD Windows Machine Learning RMM Infrastructure Software as a Service Website Mobility Proactive Monitoring Tablet Server Management Internet Exlporer Alert Covid-19 Dark Web Augmented Reality Gadgets Professional Services Training Financial Smart Technology Managed Services Remote Monitoring and Management Regulations Operating System Computing Assessment Management Office File Sharing Electronic Health Records Network Management Hard Drive Networking Co-Managed IT Employees Consulting Downtime Search Consultation Employee-Employer Relationship Mobile Security Flexibility Unified Communications Files Password Bring Your Own Device Managed Services Provider Time Management HIPAA Utility Computing Remote Workers Apps The Internet of Things Gmail Cooperation Unified Threat Management File Management Word Risk Management Patch Management Net Neutrality Payment Cards Recycling Social Network Cyber security Digitize Electronic Medical Records Computing Infrastructure Teamwork Information Technology Connectivity Microsoft Excel Cybercrime Migration eWaste Techology OneNote Computers Permission Return on Investment Cookies Cables Remote Worker Options Telephone Vulnerabilities Features Mobile Office Windows Server 2008 Authorization Google Calendar Fraud Database Management Managing Stress Technology Laws Shadow IT Alerts Websites Shared resources Going Green Politics Chatbots Outlook Disaster Resistance How To Holidays Test Travel Settings Personal Information Nanotechnology Emergency Wires Multi-Factor Security Private Cloud Virtual Reality 5G Mobile VoIP Virtual Assistant Bitcoin Mobile Computing Printer Outsource IT Procurement Firewall Manufacturing Vendor Mirgation WPA3 GDPR Spam Enterprise Content Management Unified Threat Management Outsourcing Comparison Licensing SaaS Batteries Wearable Technology Star Wars Instant Messaging Identity Theft Shortcut Enterprise Resource Planning Proactive IT IT Technology Tips Transportation Active Directory App Bookmarks ROI Data Warehousing Wireless Internet Big Data Legislation Wasting Time Current Events Geography Cyberattacks Laptop Social Distributed Denial of Service Touchscreen Hacking Smart Devices Cache Fleet Tracking Optimization Zero-Day Threat Social Networking Video Conferencing Mobile Device Management Specifications CIO applications Lenovo Customer Service Identity IT Consulting Business Telephone Wireless Digital Payment Hotspot Heating/Cooling Windows Server Screen Reader Samsung Favorites Operations Employer/Employee Relationships Apple Backup and Disaster Recovery Database Modem High-Speed Internet SharePoint Read Only Remote Working Security Cameras Managed IT Service Trending Hard Disk Drives Sensors Remote Computing Asset Tracking Virtual Machines Notes Mail Merge G Suite User Error Point of Sale Biometric Tech Terms Black Friday Statistics Tech Support Superfish MSP Finance Mobile Data Breach IT Assessment Mouse Language Servers User Management Smart Tech Conferencing Money Proactive Maintenance Solid State Drive Credit Cards Human Error Voice over Internet Protocol Projects Development Downloads Budget Printing Break Fix Solid State Drives Recovery PowerPoint Display Motherboard Address Chromebook WiFi E-Commerce Gamification Theft Cyber Monday Staff Bluetooth Value of Managed Services IT Technicians Cost Management Authentication Permissions Marketing Twitter Regulation Education CEO Students Printers Daniel Stevens

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...